Apache Apisix vulnerabilities

10 known vulnerabilities affecting apache/apisix.

Total CVEs
10
CISA KEV
2
actively exploited
Public exploits
3
Exploited in wild
2
Severity breakdown
CRITICAL2HIGH5MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2025-62232HIGHCVSS 7.5≥ 1.0, < 3.14.02025-10-31
CVE-2025-62232 [HIGH] CWE-532 CVE-2025-62232: Sensitive data exposure via logging in basic-auth leads to plaintext usernames and passwords written Sensitive data exposure via logging in basic-auth leads to plaintext usernames and passwords written to error logs and forwarded to log sinks when log level is INFO/DEBUG. This creates a high risk of credential compromise through log access. It has been fixed in the following commit: https://github.com/apache/apisix/pull/12629 Users are recommended to
nvd
CVE-2025-27446HIGHCVSS 7.8≥ 0.2, ≤ 0.52025-07-06
CVE-2025-27446 [HIGH] CWE-732 CVE-2025-27446: Incorrect Permission Assignment for Critical Resource vulnerability in Apache APISIX(java-plugin-run Incorrect Permission Assignment for Critical Resource vulnerability in Apache APISIX(java-plugin-runner). Local listening file permissions in APISIX plugin runner allow a local attacker to elevate privileges. This issue affects Apache APISIX(java-plugin-runner): from 0.2.0 through 0.5.0. Users are recommended to upgrade to version 0.6.0 or higher, w
nvd
CVE-2025-46647MEDIUMCVSS 5.3fixed in 3.12.02025-07-02
CVE-2025-46647 [MEDIUM] CWE-302 CVE-2025-46647: A vulnerability of plugin openid-connect in Apache APISIX. This vulnerability will only have an imp A vulnerability of plugin openid-connect in Apache APISIX. This vulnerability will only have an impact if all of the following conditions are met: 1. Use the openid-connect plugin with introspection mode 2. The auth service connected to openid-connect provides services to multiple issuers 3. Multiple issuers share the same private key and relies on
nvd
CVE-2024-32638MEDIUMCVSS 6.3v3.8.0v3.9.02024-05-02
CVE-2024-32638 [MEDIUM] CWE-444 CVE-2024-32638: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Apache APIS Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Apache APISIX when using `forward-auth` plugin.This issue affects Apache APISIX: from 3.8.0, 3.9.0. Users are recommended to upgrade to version 3.8.1, 3.9.1 or higher, which fixes the issue.
nvd
CVE-2023-44487HIGHCVSS 7.5KEVPoCfixed in 3.6.12023-10-10
CVE-2023-44487 [HIGH] CWE-400 CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancell The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
nvd
CVE-2022-29266HIGHCVSS 7.5fixed in 2.13.12022-04-20
CVE-2022-29266 [HIGH] CWE-209 CVE-2022-29266: In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secre In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.
nvd
CVE-2022-25757CRITICALCVSS 9.8fixed in 2.13.02022-03-28
CVE-2022-25757 [CRITICAL] CWE-20 CVE-2022-25757: In Apache APISIX before 2.13.0, when decoding JSON with duplicate keys, lua-cjson will choose the la In Apache APISIX before 2.13.0, when decoding JSON with duplicate keys, lua-cjson will choose the last occurred value as the result. By passing a JSON with a duplicate key, the attacker can bypass the body_schema validation in the request-validation plugin. For example, `{"string_payload":"bad","string_payload":"good"}` can be used to hide the "bad
nvd
CVE-2022-24112CRITICALCVSS 9.8KEVPoCfixed in 2.10.4≥ 2.11.0, < 2.12.12022-02-11
CVE-2022-24112 [CRITICAL] CWE-290 CVE-2022-24112: An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Adm An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But the
nvd
CVE-2021-43557HIGHCVSS 7.5fixed in 2.10.22021-11-22
CVE-2021-43557 [HIGH] CWE-77 CVE-2021-43557: The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $req The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like `//internal/` can be used to bypas
nvd
CVE-2020-13945MEDIUMCVSS 6.5PoC≥ 1.2, ≤ 1.52020-12-07
CVE-2020-13945 [MEDIUM] CVE-2020-13945: In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rul In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.
nvd
Apache Apisix vulnerabilities | cvebase